{"id":1398,"date":"2014-09-25T08:29:23","date_gmt":"2014-09-25T12:29:23","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=1398"},"modified":"2020-02-26T18:36:45","modified_gmt":"2020-02-26T15:36:45","slug":"kobilerin-mobil-cihazlarda-guvenlik-icin-kaynaklari-yetersiz","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/kobilerin-mobil-cihazlarda-guvenlik-icin-kaynaklari-yetersiz\/1398\/","title":{"rendered":"KOB\u0130&#8217;lerin Mobil Cihazlarda G\u00fcvenlik \u0130\u00e7in Kaynaklar\u0131 Yetersiz"},"content":{"rendered":"<p>25\u2019ten az say\u0131da \u00e7al\u0131\u015fan\u0131 bulunan \u00c7ok K\u00fc\u00e7\u00fck \u00d6l\u00e7ekli \u0130\u015fletmelerin mobil cihazlar\u0131 benimseme h\u0131z\u0131 kurumsal \u015firketlerle ayn\u0131. Fakat \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin \u00e7o\u011fu, \u015firketlerin veya \u00e7al\u0131\u015fanlar\u0131n sahip oldu\u011fu mobil cihazlar\u0131 (BYOD) d\u00fczg\u00fcn bir \u015fekilde korumak i\u00e7in gerekli g\u00fcvenlik bilgileri, teknik uzmanl\u0131k ve b\u00fct\u00e7eye sahip de\u011fil.<\/p>\n<p><a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab\u2019\u0131n d\u00fczenledi\u011fi ve T\u00fcrkiye\u2019nin de dahil oldu\u011fu bir ankette<\/a> d\u00fcnyan\u0131n her yerinden 3.900 BT \u00e7al\u0131\u015fan\u0131na son 12 ay i\u00e7inde kar\u015f\u0131la\u015ft\u0131klar\u0131 BT sorunlar\u0131 hakk\u0131nda sorular y\u00f6neltildi. Ankette \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin %34\u2019\u00fc, mobil cihazlar\u0131n i\u015fletmeye entegrasyonunun \u00fcstesinden geldiklerini belirtti. Burada dikkate de\u011fer nokta, bu benimseme h\u0131z\u0131n\u0131n kurumsal i\u015fletmelerin %35\u2019lik mobil entegrasyon h\u0131z\u0131yla neredeyse ayn\u0131 olmas\u0131. Bu, d\u00fcnyadaki en k\u00fc\u00e7\u00fck \u015firketlerin bile mobil teknolojisini 5.000\u2019den fazla \u00e7al\u0131\u015fan\u0131 bulunan b\u00fcy\u00fck \u015firketlerle hemen hemen ayn\u0131 h\u0131zda benimsedi\u011fi anlam\u0131na geliyor.<\/p>\n<p>Mobil teknolojisi i\u00e7in i\u015fletmelerin \u00f6l\u00e7e\u011fi bir k\u0131s\u0131tlama olmamakla birlikte g\u00f6z \u00f6n\u00fcnde bulundurulmas\u0131 gereken ba\u015fka fakt\u00f6rler bulunuyor. Uzmanl\u0131k ve kaynaklar, genellikle teknoloji uygulamalar\u0131n\u0131 y\u00f6netmek i\u00e7in ayr\u0131 BT personeline sahip olmayan \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmeler i\u00e7in ilk akla gelen k\u0131s\u0131tlamalar. Bu k\u0131s\u0131tlamalar, g\u00fcvenli\u011fi \u00f6n planda tutan i\u015fletme sahipleri i\u00e7in bile bir bilgi a\u00e7\u0131\u011f\u0131 do\u011furabilir. \u00d6rne\u011fin \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin %31\u2019i, \u00f6n\u00fcm\u00fczdeki 12 ay i\u00e7inde \u201cMobil\/Ta\u015f\u0131nabilir Bilgi \u0130\u015flem Cihazlar\u0131n\u0131n G\u00fcvenli\u011fini Sa\u011flaman\u0131n\u201d en \u00f6nemli BT g\u00fcvenli\u011fi \u00f6nceliklerinden biri olaca\u011f\u0131n\u0131 belirtmi\u015f (\u00f6nceki 12 ay\u0131n %34 benimseme h\u0131z\u0131 oran\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131labilir). Bununla birlikte, \u00e7al\u0131\u015fanlar\u0131n \u00e7al\u0131\u015fmak amac\u0131yla kendi cihazlar\u0131n\u0131 kulland\u0131klar\u0131 BYOD (Kendi Cihaz\u0131n\u0131 Getir) ilkeleri hakk\u0131nda sorular soruldu\u011funda alg\u0131n\u0131n, \u015firketlerin \u00f6l\u00e7eklerine g\u00f6re de\u011fi\u015fti\u011fi g\u00f6r\u00fclm\u00fc\u015f: Kurumsal \u00f6l\u00e7ekli \u015firketlerin %19\u2019u bu ilkeyi benimsemi\u015f ancak bu oran \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli \u0130\u015fletmelerde sadece %9\u2019da kalm\u0131\u015f.<\/p>\n<p>Teknoloji trendleri ile ilgili sorular y\u00f6neltildi\u011finde \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin %28\u2019i BYOD ilkelerinin i\u015fletmelerine fazladan bir BT riski ta\u015f\u0131yaca\u011f\u0131n\u0131 kabul ettikleri g\u00f6r\u00fclm\u00fc\u015f. Ancak b\u00fcy\u00fck \u00f6l\u00e7ekli i\u015fletmeler ve kurumlar\u0131n yan\u0131tlama h\u0131z\u0131 \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin yan\u0131tlama h\u0131z\u0131n\u0131n iki kat\u0131 olmakla birlikte, BYOD ilkelerinin risklerini s\u0131ras\u0131yla % 52 ve %48 oranlar\u0131yla kabul etmekte.<\/p>\n<p>\u00c7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmeler \u00e7al\u0131\u015fanlar\u0131n\u0131n sahip oldu\u011fu mobil cihazlarla \u00e7al\u0131\u015fmalar\u0131n\u0131n bir g\u00fcvenlik riski te\u015fkil ediyor oldu\u011funu d\u00fc\u015f\u00fcnerek konuyu abart\u0131yor olabilirler mi? K\u0131s\u0131tl\u0131 b\u00fct\u00e7eleriyle \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin, \u00e7al\u0131\u015fan\u0131n sahip oldu\u011fu cihazlar ilkesini bir maliyet tasarrufu \u00f6nlemi olarak g\u00f6r\u00fcyor olmas\u0131 ve bu cihazlar\u0131 memnuniyetle kendi a\u011flar\u0131na kabul edecekleri ger\u00e7e\u011fi tedirgin edici bir olas\u0131l\u0131k olarak g\u00f6r\u00fcn\u00fcyor. \u00c7al\u0131\u015fanlar\u0131n sahip oldu\u011fu cihazlar\u0131n neden olabilece\u011fi en yayg\u0131n tehditler aras\u0131nda zararl\u0131 ve sahte yaz\u0131l\u0131mlar, \u015firket a\u011f\u0131na \u00e7al\u0131\u015fan\u0131n cihaz\u0131ndan ba\u011flanma veya \u00e7al\u0131\u015fan\u0131n cihaz\u0131n\u0131n \u00e7al\u0131nmas\u0131 veya kaybolmas\u0131yla \u015firket verilerinin \u00e7al\u0131nmas\u0131 say\u0131labilir.<\/p>\n<p><strong>Belirli Bir B\u00fct\u00e7e \u0130\u00e7inde Mobil G\u00fcvenli\u011fi i\u00e7in Ad\u0131mlar<\/strong><\/p>\n<p>\u00c7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerden bir\u00e7o\u011funun geli\u015fmi\u015f mobil g\u00fcvenlik \u00e7\u00f6z\u00fcmleri i\u00e7in yeterli b\u00fct\u00e7e ve teknik bilgiye sahip olmad\u0131\u011f\u0131 bir ger\u00e7ek olsa da k\u00fc\u00e7\u00fck i\u015fletmeler yine de \u00e7ok fazla para ve zaman harcamadan \u00e7al\u0131\u015fanlar\u0131n sahip oldu\u011fu cihazlar da dahil olmak \u00fczere mobil teknolojisini kullanabilirler. Sa\u011fduyu ve do\u011fru teknolojinin bir kar\u0131\u015f\u0131m\u0131 mobil cihazlar\u0131n g\u00fcvenli\u011finin sa\u011flanmas\u0131nda daha uzun s\u00fcreler kullan\u0131labilir ve yeni a\u00e7\u0131lan bir i\u015fletmenin i\u015flerini yoluna koymas\u0131na yard\u0131mc\u0131 olabilir.<\/p>\n<p><strong>1) \u00c7al\u0131\u015fan E\u011fitimi:<\/strong> \u0130\u015fletme verilerinin korunmas\u0131nda ilk a\u015fama \u00e7al\u0131\u015fanlarda g\u00fcvenlik al\u0131\u015fkanl\u0131klar\u0131 sa\u011flamakt\u0131r. Yeni \u00e7al\u0131\u015fanlar\u0131n ak\u0131ll\u0131 telefonlar\u0131nda veya tabletlerinde i\u015f yerine ait bilgiler bulundu\u011funu bildiklerinden emin olun ve bu cihazlar\u0131n gereksiz yere riskli bir \u015fekilde kullan\u0131lmamas\u0131 (\u00f6rne\u011fin, \u015f\u00fcpheli web sitelerine girme) ve e\u011fer cihaz \u00e7al\u0131n\u0131r veya kaybedilirse, <a href=\"https:\/\/www.kaspersky.com\/tr\/about\/news\/virus\/2014\/Calisanlar-Calinti-Mobil-Cihaz-Bildirimlerinde-Yavas-Kaliyor\" target=\"_blank\" rel=\"noopener nofollow\">i\u015fverene g\u00fcnler sonra de\u011fil de derhal bildirilmesi gerekti\u011fini anlat\u0131n<\/a>.<\/p>\n<p><strong>2) Temel H\u0131rs\u0131zl\u0131k \u00d6nleme:<\/strong> kay\u0131p veya \u00e7al\u0131nan cihazlardaki verileri uzaktan silebilen uygun maliyetli bir yaz\u0131l\u0131m kullanmak \u00f6nemlidir. Baz\u0131 cihazlar benzer i\u015flevleri dahili olarak sa\u011flar ve ayr\u0131ca bu g\u00f6revi yerine getirebilecek bir\u00e7ok \u00fc\u00e7\u00fcnc\u00fc \u015fah\u0131s uygulamas\u0131 da bulunur. Ancak \u00e7al\u0131\u015fanlar\u0131n, cihaz silindi\u011fi takdirde cihazda bulunan ki\u015fisel bilgilerinin de silinece\u011fini ve bu bilgileri yedeklemeleri gerekti\u011fini anlamalar\u0131n\u0131 sa\u011flay\u0131n.<\/p>\n<p><strong>3) Karma\u015f\u0131kl\u0131ktan Ka\u00e7\u0131n\u0131n:<\/strong> yeni kurulan ve sadece be\u015f \u00e7al\u0131\u015fan\u0131 bulunan bir \u015firket, kendi ama\u00e7lar\u0131na uygun olmayan kurumsal d\u00fczeyde bir g\u00fcvenlik \u00fcr\u00fcn\u00fcn\u00fc sat\u0131n almak, uygulamak ve y\u00f6netmek i\u00e7in saatler harcayamaz. \u0130\u015fletmenin ihtiyac\u0131 olandan daha b\u00fcy\u00fck bir \u00fcr\u00fcn\u00fc sat\u0131n almaktan ka\u00e7\u0131n\u0131n ve temel mobil g\u00fcvenlik \u00f6zelliklerinden \u015fa\u015fmay\u0131n.<\/p>\n<p>\u00c7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmeler i\u00e7in \u00f6zel olarak tasarlanan <strong>Kaspersky Small Office Security<\/strong> \u00fcr\u00fcn\u00fc, zararl\u0131 yaz\u0131l\u0131m \u00f6nleme, uygulama onaylama ve h\u0131rs\u0131zl\u0131k \u00f6nleme dahil en \u00f6nemli mobil koruma \u00f6zelliklerini i\u00e7eriyor. Bu \u00e7\u00f6z\u00fcm mobil cihazlar, veri \u015fifreleme ve u\u00e7 nokta g\u00fcvenli\u011fi i\u00e7in en temel y\u00f6netim ara\u00e7lar\u0131n\u0131 sadece dakikalar i\u00e7inde ayarlanabilen t\u00fcketici dostu bir arabirimle sa\u011fl\u0131yor.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/small-office-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> hakk\u0131nda daha fazla bilgi edinmek i\u00e7in Kaspersky Lab web sitesini ziyaret edin. Kaspersky Lab mobil g\u00fcvenlik teknolojisi hakk\u0131nda daha fazla bilgi edinmek i\u00e7in <a href=\"https:\/\/www.kaspersky.com\/business-security\/mobile\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mobile<\/a> \u00fcr\u00fcn serisine g\u00f6z at\u0131n ve \u015firketin mobil g\u00fcvenlik ve BYOD i\u00e7in \u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/byod-for-dummies?icid=b2b_bnr_hp_dg\" target=\"_blank\" rel=\"noopener nofollow\">Yeni Ba\u015flayanlar K\u0131lavuzunu<\/a>\u201d okuyun.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>25\u2019ten az say\u0131da \u00e7al\u0131\u015fan\u0131 bulunan \u00c7ok K\u00fc\u00e7\u00fck \u00d6l\u00e7ekli \u0130\u015fletmelerin mobil cihazlar\u0131 benimseme h\u0131z\u0131 kurumsal \u015firketlerle ayn\u0131. Fakat \u00e7ok k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmelerin \u00e7o\u011fu, \u015firketlerin veya \u00e7al\u0131\u015fanlar\u0131n sahip oldu\u011fu mobil cihazlar\u0131 (BYOD)<\/p>\n","protected":false},"author":350,"featured_media":1399,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[744,646,751,145],"class_list":{"0":"post-1398","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-guvenlik","10":"tag-kobi","11":"tag-mobil","12":"tag-virus"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kobilerin-mobil-cihazlarda-guvenlik-icin-kaynaklari-yetersiz\/1398\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik\/","name":"G\u00fcvenlik"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"predecessor-version":[{"id":7776,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions\/7776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/1399"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}